summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--content/blog/2020/email-server-extras.md6
-rw-r--r--templates/page.html7
2 files changed, 9 insertions, 4 deletions
diff --git a/content/blog/2020/email-server-extras.md b/content/blog/2020/email-server-extras.md
index 47d826e..2af52a4 100644
--- a/content/blog/2020/email-server-extras.md
+++ b/content/blog/2020/email-server-extras.md
@@ -218,7 +218,7 @@ You can configure OpenSMTPD to request a client certificate
for sending emails, as a second factor for authentication.
-#### Creating certificates
+#### Certificates
We need to start with some cryptography to create and verify certificates.
I recommend that you do all of this on your trusted *client* device,
@@ -268,7 +268,7 @@ If you want to multiple client certificates,
just repeat the last few steps for each one.
-#### Server configuration
+#### Server
OpenSMTPD needs to verify the validity of client certificates
using the CA's public certificate, so you should copy that
@@ -290,7 +290,7 @@ The magic word here is "`verify`", which tells OpenSMTPD
to ask for a client certificate and to verify it using the given CA.
-#### Client configuration
+#### Client
Now you won't be able to send emails if your client doesn't
present its certificate to the server!
diff --git a/templates/page.html b/templates/page.html
index 2144e35..b06039f 100644
--- a/templates/page.html
+++ b/templates/page.html
@@ -9,7 +9,12 @@
<li><a href="{{ h2.permalink | safe }}">{{ h2.title }}</a>
{% if h2.children %}
<ul>{% for h3 in h2.children %}
- <li><a href="{{ h3.permalink | safe }}">{{ h3.title }}</a></li>
+ <li><a href="{{ h3.permalink | safe }}">{{ h3.title }}</a>
+ {% if h3.children %}
+ <ul>{% for h4 in h3.children %}
+ <li><a href="{{ h4.permalink | safe }}">{{ h4.title }}</a>
+ {% endfor %}</ul>
+ {% endif %}</li>
{% endfor %}</ul>
{% endif %}</li>
{% endfor %}</ul>